Web Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration

In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation.

But what about when you move to the cloud?

Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right?

Everything going well, your valuable data will be migrated without a hitch and will be at your fingertips just in case legal or compliance issues arise.

But what if it doesn’t? What if, when you go to pull-up company records, your data is corrupted or not there at all?

That’s when the headache starts. Your legal team starts knocking on your door, compliance officers look to point their fingers at one of your team, and you face a hefty fine for data spoliation.

Oops.

As much as I’d like to say I’m painting a dystopian picture that has very little foothold in reality… that’s just not the case.

Just ask UBS Warburg, West and Phillip Morris.

Now, I’m not an expert on all things data migration, but I do know a thing or two about the backbone of corporate communications: email.

Seemingly innocuous, email is the kind of thing many don’t tend to think much about. You send, receive, agonize over and trash thousands of emails a year. But it’s just email right? How difficult can it be to migrate it to a new cloud service?

The truth is, it’s pretty darn difficult.

Sure, there are lots of email migration vendors out there, waving their hands in the air and jumping up and down saying: “Pick me! Pick me!” (full disclosure: I work for Fookes Software and our product Aid4Mail is right there jumping and waving with the best of them). But how many of them can you really trust?

The fact is, converting email accurately is incredibly complex and we’ve seen very few vendors actually do it well.

Here are just some of the issues we’ve seen come up with poorly converted emails, all of which could result in data spoliation sanctions:

  • Entire folders of emails skipped because of a few special characters in the folder name
  • Unable to render special characters or character based languages (like Chinese, Arabic and Hebrew)
  • Lost attachments
  • Alteration of the SMTP header, this means:
    • Loss of original sent, received and stored dates
    • Loss of email addresses
    • Loss of status information (read, unread etc)
  • Emails being skipped as they’re too large

We even have an example for you:

figure_1

figure_2

And here’s another one:

figure_3

figure_4

So to put this into context, let’s say you produce consumer electronics. You’ve just launched a flagship device after a few years of planning and development. Everyone’s thrilled!

BUT there’s an issue with the battery. It overheats and catches fire in certain circumstances.

A few of your customers’ houses burnt down, a couple of cars caught on fire and around 20 people suffered from burns.

One of the burn victims has leaked some inside information, and now they want to sue you for negligence. The plaintiff is saying you knew about the battery issue and chose not to do anything about so as not to jeopardize the launch.

You’re not worried, you can prove that no one knew anything about it. So, you go back into your archives to pull up all the relevant communication between the project team and your Chinese battery supplier.

That’s when you see that all the emails between the China-based purchasing manager and the battery supplier are all question marks and blank spaces.

The sent date is showing as after the received date and all the emails look like they’re unread.

This, my friends, is data spoliation. Sure it’s not your fault, but you’ll still get sanctioned.

So, what’s the moral of this cautionary tale? Test, test and test again before you choose ANY migration application to move your email to the cloud.

Taking the time now to thoroughly test the application in all scenarios before you commit will pay off in the long run.

By Katie Cullen Montgomerie

Katie is the marketing and communications manager for Fookes Software, the developers of email migration software Aid4Mail.

Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...
Dinesh Varadharajan
The Future with Automation Many entrepreneurs believe digital technologies will transform the way their companies work. By 2022, the worldwide hyper-automation technology market is expected to be worth $596.6 billion. And by 2055, almost half ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.